Abstract

Image sharing in open and public communication infrastructure is vulnerable. There are several solutions articulated by worldwide researchers for secure image transmission. However, with the increasing computing capacity and capability, the currently available security solutions are being breached. This yearns for more robust solutions. The significant contribution of the proposed work involves in the generation of a new hash algorithm for the entire RGB image of size 256 × 256 with no Region of Interest (RoI) restriction. This paper mainly focuses on integrity verification, tamper detection, localisation of the tampered area and its restoration. The whole image is considered as sensitive data for which one-way integrity verification code is generated block-wise to locate the areas of tampering. Integrity validation phase will compare the received digest and generated the digest from the received image. Blocks which are failed to pass in integrity validation will undergo the recovery process.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.